2023-12-04T08:30:55Z - 2024-12-04T08:30:55Z
Overview
15 Pull requests merged by 7 users
Merged
#164 add mobile setup for Mullvad VPN
Merged
#163 How to Get a Credit Card Anonymously (Credit Cards as a Service)
Merged
#157 add Peer-to-Peer Large File Sharing (Torrents over VPN)
Merged
#156 Adds PoW tutorial for opsec/torwebsite
Merged
#152 add How to Get an Email Account Anonymously (Emails as a Service)
Merged
#150 add How to Receive Anonymous SMSes
Merged
#143 How to Maintain Multiple Identities Online
Merged
#144 update physical opsec graph for better anonymity
Merged
#142 update "How to remain Anonymous during a protest"
Merged
#138 new tutorial contribution
Merged
#60 steghide-tutorial
Merged
#7 Fixed typos and broken link
Merged
#4 Fix typo + add Privacy article
Merged
#3 main
Merged
#2 Upload files to "assets/robert.png"
59 Issues closed from 1 user
Closed
#58 Anonymity - How to access Tor when VPNs are blocked, using VPSes (SSH port forwarding or openvpn port sharing)
Closed
#171 Deniability - Open Source Router VM Setup (Opnsense on QEMU/KVM)
Closed
#52 Anonymity - How to setup your Monero Wallet - To be simplified
Closed
#106 Anonymity - Hidden Service with custom .onion Vanity V3 address
Closed
#26 Anonymity - How to get a mail account anonymously (Mails as a service)
Closed
#96 Anonymity - Why can't I trust Centralised Exchanges, and random Monero nodes ?
Closed
#27 Anonymity - How to Receive Anonymous SMSes (Remote SMSes as a Service)
Closed
#129 Anonymity - Easy Anonymous Chats - SimpleX
Closed
#56 OPSEC - How to maintain multiple Identities Online
Closed
#32 Anonymity - How to remain Anonymous during a protest
Closed
#35 Deniability - Hiding textfiles into images
Closed
#132 How to contribute to the Opsec Blog
Closed
#18 Anonymity - Haveno Seed Node
Closed
#101 Anonymity - Tor Node
Closed
#53 Anonymity - Haveno DEX F2F trades tutorial - to be updated
Closed
#98 Anonymity - Haveno DEX Bank Transfer (ex: SEPA) -> XMR transaction
Closed
#97 Anonymity - Haveno DEX Dispute resolution (Fiat -> XMR)
Closed
#95 Anonymity - Why Financial decentralisation ? (Cryptocurrencies, Exchanges and KYC) ⭐
Closed
#94 Anonymity - How to access Tor when it is being blocked, using VPNs
Closed
#93 Anonymity - VMs for Long-term Anonymity (Whonix QEMU VMs)
Closed
#92 Anonymity - Tails OS QEMU VM for Temporary Anonymity
Closed
#91 Anonymity - How to use the Tor Browser on Mobile
Closed
#90 Anonymity - Tor Web Browser setup
Closed
#89 Anonymity - Using Tor Safely: Tor through VPN or VPN through Tor ?
Closed
#88 Anonymity - The main source of Anonymity: The Tor Network
Closed
#87 Anonymity - Why isn't Privacy enough for Anonymous use ?
Closed
#86 Anonymity - What is Anonymity ? Why is it Important ?
Closed
#99 Anonymity - Haveno DEX Cash By Mail -> XMR transaction ⭐
Closed
#102 Anonymity - Tor Exit Node
Closed
#103 Anonymity - Monero Node
Closed
#104 Anonymity - Monero Mining with p2pool (help validate the network)
Closed
#105 Anonymity - Where to host Anonymous Hidden Services ?
Closed
#107 Anonymity - XMPP Chat Server Setup (Clearnet + Onion + OMEMO E2EE)
Closed
#108 Anonymity - Where to host Anonymous Clearnet Services ?
Closed
#109 Anonymity - How to rent remote servers anonymously (Cloud resellers) ⭐
Closed
#110 Anonymity - How to rent remote domains anonymously (Registrar resellers) ⭐
Closed
#111 Anonymity - Remote anonymous access setup (cockpit + ssh through tor)
Closed
#112 Anonymity - Clearnet Bind9 DNS server setup (with DNSSEC)
Closed
#114 Anonymity - Anonymous (remote or self-hosted) clearnet Mail Server ⭐
Closed
#85 Privacy - Private Messaging (PGP encryption)
Closed
#84 Privacy - Serverside: Why can't I trust serverside encryption ?
Closed
#83 Privacy - Password Management 101 (How to use Keepass)
Closed
#82 Privacy - Route QEMU VMs through a Host OS VPN
Closed
#79 Privacy - How to compile open source software + How to verify software integrity
Closed
#78 Privacy - How to have Privacy on your Phone (GrapheneOS)
Closed
#77 Privacy - How to install and update programs on Linux
Closed
#76 Privacy - How to have Privacy on your Computer (Linux) ⭐
Closed
#75 Privacy - The lack of Open Source Hardware (CPUs, Motherboards, GPUs)
Closed
#74 Privacy - The main source of Privacy: Open source software
Closed
#73 Privacy - What is Privacy ? Why is it important ?
Closed
#72 Opsec - OPSEC: Using the right Technology and Behavior
Closed
#71 Opsec - Internet usage segmentation (QEMU VMs + Identity Management)
Closed
#70 Opsec - Audit your OPSEC and determine the appropriate internet use
Closed
#69 Concepts - Governments fear Decentralisation and Anonymity
Closed
#68 Concepts - Governments, Centralisation, and Law Enforcement
Closed
#67 Concepts - Privacy, Anonymity, Plausible Deniability, Decentralisation, Security, and 0days
Closed
#15 Anonymity - How to send small files Anonymously (Onionshare)
Closed
#45 Deniability - Steganography Introduction
Closed
#46 Anonymity - Steganography : How to hide textfiles into images
69 Issues created by 2 users
Opened
#11 Privacy - One on One large file sharing (Syncthing over VPN)
Opened
#12 Privacy - P2P large file sharing (Torrents over VPN)
Opened
#13 Anonymity - Stylography protection (Running a Local LLM and copy pasting messages)
Opened
#14 Anonymity - Phone Numbers are incompatible with Anonymity - to be improved
Opened
#16 Anonymity - One on One large file sharing (Syncthing over Tor)
Opened
#17 Anonymity - P2P large file sharing (Torrents over Tor)
Opened
#19 Anonymity - Haveno DEX Network
Opened
#22 Anonymity - Gitea .onion setup (Code repositories)
Opened
#28 Anonymity - How to get a credit card anonymously (Credit cards as a service)
Opened
#29 Anonymity - How to get residential proxies anonymously
Opened
#30 Anonymity - How to send a mail package anonymously
Opened
#31 Anonymity - How to recieve a mail package anonymously
Opened
#33 Deniability - Deniable Encryption Protection (emergency shutdown script, shortcut, + systemd service) - to be improved
Opened
#36 Deniability - When the Adversary is the cloud provider himself
Opened
#37 Deniability - Protecting against cold boot attacks, with RAM encryption (no hardware access!)
Opened
#38 Deniability - System Intrusion / Integrity monitoring (kernel modules, binary files, unwanted processes, hardwre changes)
Opened
#39 Deniability - Custom Linux OS making (debian-based)
Opened
#40 Deniability - Obtaining a non-KYC dedicated server, with a custom OS
Opened
#41 Deniability - Intrusion detection on remote servers
Opened
#42 Anonymity - How to setup and navigate Qubes OS
Opened
#43 Anonymity - How to protect against fingerprinting (disabling js, persona, text, files)
Opened
#47 Anonymity - How to setup Nerostr (Nostr blogging)
Opened
#48 Anonymity - Monero Inheritance setup
Opened
#49 Deniability - How to Cash out your crypto gains (Fiat income limits, and justifications)
Opened
#50 Anonymity - How to get your first Monero ? (xmrbazaar.com, crypto swaps, p2p chats, or work)
Opened
#51 Deniability - Sensitive use VMs Setup (Whonix VMs in a Veracrypt Hidden Volume) - To be simplified
Opened
#54 Anonymity - How to Anonymously access websites that block Tor - to be redone
Opened
#57 Anonymity - How to temporarily access Tor when VPNs are blocked, using Tor bridges
Opened
#59 Anonymity - How to access Tor when you are in Russia or China using v2ray (vmess / vless)
Opened
#61 Privacy - Easy Private Chat - Simplex
Opened
#63 Deniability - When protests go wrong - Simplex Disappearing Messages
Opened
#64 Anonymity - Convert Monero into other Cryptos Anonymously (XMR -> BTC)
Opened
#66 Deniability - Isolating on-premise hidden services (VM-based restrictive networking)
Opened
#80 Privacy - How to Virtualize Machines (QEMU/KVM Hypervisor)
Opened
#81 Privacy - How to get privacy from your ISP using a VPN
Opened
#100 Anonymity - Tor Bridge Node
Opened
#116 Reddit replacement .onion lemmy if it can federate over tor
Opened
#117 for all tutorials, make sure there are the opsec requirements, and an elaborate "why" on each tutorial
Opened
#119 Preparing the Body - Diet to favor cerebral activity
Opened
#121 Preparing the Mind - Scio Nihil: Dissolving Beliefs
Opened
#122 Preparing the Mind - Sum Nihil: Dissolving the Self
Opened
#123 Planning the Work - The right thing to do: What is the reason behind your actions?
Opened
#124 Doing the Work - Pomodoro Focus times (Intentional pauses to prevent burnouts)
Opened
#125 Planning the work - Macro Workflow: Listing Topics that truly matter
Opened
#126 Planning the Work - Micro Workflow: Todo Listing, Contextualizing, and Ordering Tasks
Opened
#127 Doing the Work - Zero Email Workflow (in Thunderbird)
Opened
#128 Planning the Work - When the TodoList is too big - Kanban Project Management (Gitea)
Opened
#130 Deniability - Plausibly Deniable Critical Data Backups
Opened
#133 Nihilism: Mantras to reset the Mind
Opened
#134 Doing the Work - The Morning Routine
Opened
#135 Reflecting: Brainstorming Ideas while on the run
Opened
#136 Doing the work - Workspace Preparation: Mental Energy Optimisation
Opened
#137 Planning the Work - How to use graphs to help Brainstorming ideas (draw.io)
Opened
#139 Privacy - How to hide the contents of a mail package
Opened
#146 Deniability - When your harddrives must look innocent and you can only use VPNs
Opened
#147 Deniability - When your harddrives must look innocent and you can use Tails
Opened
#148 Deniability - When your harddrives must look innocent and you can't use Tails nor VPNs
Opened
#151 Deniability - How to convert any Identity to a Deniable Identity
Opened
#153 OPSEC - How to run the blog yourself
Opened
#154 Cold Exposure: Where Discipline takes over Comfort
Opened
#155 yoga to stretch the entire body
Opened
#158 Open source router setup: OpenWRT
Opened
#160 Using the Host-OS in live-mode to prepare for long-term Sensitive Use
Opened
#161 Privacy - How to have privacy on your Router (openwrt)
Opened
#165 Add a difficulty slider on each tutorial, along with a time estimate
Opened
#167 Deniability - How to hide your monero ?
Opened
#168 Anonymity - When should I use i2p instead of Tor ?
Opened
#169 Anonymity - "Why is the darknet superior to clearnet ?"
Opened
#170 Anonymity - How to obtain Internet access anonymously